@culturefy/shared 1.0.38 → 1.0.40

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (81) hide show
  1. package/build/cjs/constants/app.js +45 -0
  2. package/build/cjs/constants/app.js.map +1 -0
  3. package/build/cjs/constants/index.js +10 -0
  4. package/build/cjs/constants/index.js.map +1 -0
  5. package/build/cjs/index.js +6 -0
  6. package/build/cjs/index.js.map +1 -1
  7. package/build/cjs/middlewares/sample middleware.js +2 -0
  8. package/build/cjs/middlewares/sample middleware.js.map +1 -0
  9. package/build/cjs/middlewares/verify-middleware.js +202 -0
  10. package/build/cjs/middlewares/verify-middleware.js.map +1 -0
  11. package/build/cjs/types/app.js +2 -0
  12. package/build/cjs/types/app.js.map +1 -0
  13. package/build/cjs/types/middleware.js +2 -0
  14. package/build/cjs/types/middleware.js.map +1 -0
  15. package/build/cjs/utils/cookies.js +28 -0
  16. package/build/cjs/utils/cookies.js.map +1 -0
  17. package/build/cjs/utils/index.js +6 -0
  18. package/build/cjs/utils/index.js.map +1 -1
  19. package/build/cjs/utils/middleware.js +71 -0
  20. package/build/cjs/utils/middleware.js.map +1 -0
  21. package/build/esm/constants/app.js +41 -0
  22. package/build/esm/constants/app.js.map +1 -0
  23. package/build/esm/constants/index.js +2 -0
  24. package/build/esm/constants/index.js.map +1 -0
  25. package/build/esm/index.js +1 -0
  26. package/build/esm/index.js.map +1 -1
  27. package/build/esm/middlewares/sample middleware.js +2 -0
  28. package/build/esm/middlewares/sample middleware.js.map +1 -0
  29. package/build/esm/middlewares/verify-middleware.js +197 -0
  30. package/build/esm/middlewares/verify-middleware.js.map +1 -0
  31. package/build/esm/types/app.js +2 -0
  32. package/build/esm/types/app.js.map +1 -0
  33. package/build/esm/types/middleware.js +2 -0
  34. package/build/esm/types/middleware.js.map +1 -0
  35. package/build/esm/utils/cookies.js +24 -0
  36. package/build/esm/utils/cookies.js.map +1 -0
  37. package/build/esm/utils/index.js +1 -0
  38. package/build/esm/utils/index.js.map +1 -1
  39. package/build/esm/utils/middleware.js +65 -0
  40. package/build/esm/utils/middleware.js.map +1 -0
  41. package/build/src/constants/app.d.ts +2 -0
  42. package/build/src/constants/app.js +38 -0
  43. package/build/src/constants/app.js.map +1 -0
  44. package/build/src/constants/index.d.ts +1 -0
  45. package/build/src/constants/index.js +5 -0
  46. package/build/src/constants/index.js.map +1 -0
  47. package/build/src/index.d.ts +1 -0
  48. package/build/src/index.js +1 -0
  49. package/build/src/index.js.map +1 -1
  50. package/build/src/middlewares/sample middleware.d.ts +0 -0
  51. package/build/src/middlewares/sample middleware.js +2 -0
  52. package/build/src/middlewares/sample middleware.js.map +1 -0
  53. package/build/src/middlewares/verify-middleware.d.ts +2 -0
  54. package/build/src/middlewares/verify-middleware.js +167 -0
  55. package/build/src/middlewares/verify-middleware.js.map +1 -0
  56. package/build/src/types/app.d.ts +29 -0
  57. package/build/src/types/app.js +3 -0
  58. package/build/src/types/app.js.map +1 -0
  59. package/build/src/types/middleware.d.ts +3 -0
  60. package/build/src/types/middleware.js +3 -0
  61. package/build/src/types/middleware.js.map +1 -0
  62. package/build/src/utils/cookies.d.ts +2 -0
  63. package/build/src/utils/cookies.js +25 -0
  64. package/build/src/utils/cookies.js.map +1 -0
  65. package/build/src/utils/index.d.ts +1 -0
  66. package/build/src/utils/index.js +1 -0
  67. package/build/src/utils/index.js.map +1 -1
  68. package/build/src/utils/middleware.d.ts +12 -0
  69. package/build/src/utils/middleware.js +64 -0
  70. package/build/src/utils/middleware.js.map +1 -0
  71. package/package.json +1 -1
  72. package/src/constants/app.ts +40 -0
  73. package/src/constants/index.ts +1 -0
  74. package/src/index.ts +2 -1
  75. package/src/middlewares/sample middleware.ts +0 -0
  76. package/src/middlewares/verify-middleware.ts +197 -0
  77. package/src/types/app.ts +27 -0
  78. package/src/types/middleware.ts +10 -0
  79. package/src/utils/cookies.ts +24 -0
  80. package/src/utils/index.ts +2 -1
  81. package/src/utils/middleware.ts +70 -0
@@ -0,0 +1,197 @@
1
+ import { sendResponse } from "../utils";
2
+ import { APP_MAP } from "../constants";
3
+ import { jwtDecode } from "jwt-decode";
4
+ import { setCookieKV } from "../utils/cookies";
5
+ const apiURL = process.env.REFRESH_SESSION_URL || '';
6
+ const parseCookieHeader = header => {
7
+ const out = {};
8
+ if (!header) return out;
9
+ for (const part of header.split(";")) {
10
+ const [k, ...rest] = part.trim().split("=");
11
+ if (!k) continue;
12
+ out[k] = decodeURIComponent(rest.join("=") || "");
13
+ }
14
+ return out;
15
+ };
16
+ export const verifyMw = async (req, ctx, next) => {
17
+ var _APP_MAP$appId, _p, _ref, _ref$state, _p$cfy_tid, _p$sub, _ref2, _p$cfy_bid, _ref3, _p$email, _p$name, _ref4, _p$resource_access$ex, _p$resource_access, _p$realm_access;
18
+ const appId = req.headers.get("app-id");
19
+ if (!appId || !(APP_MAP != null && (_APP_MAP$appId = APP_MAP[appId]) != null && _APP_MAP$appId.clientId)) {
20
+ return sendResponse(400, {
21
+ status: "bad_request",
22
+ reason: "invalid_app"
23
+ });
24
+ }
25
+ const expectedClientId = APP_MAP[appId].clientId;
26
+
27
+ // cookies
28
+ const cookies = parseCookieHeader(req.headers.get("cookie"));
29
+ const at = cookies[`__Secure-session-v1.${appId}.at`];
30
+ const rt = cookies[`__Secure-session-v1.${appId}.rt`];
31
+ if (!at && !rt) {
32
+ return sendResponse(401, {
33
+ status: "unauthenticated",
34
+ reason: "no_tokens"
35
+ });
36
+ }
37
+
38
+ // decode/verify (lightweight; replace with your verifyJsonWebToken if you have it)
39
+ let p;
40
+ try {
41
+ p = jwtDecode(at);
42
+ } catch (_unused) {
43
+ return sendResponse(401, {
44
+ status: "unauthenticated",
45
+ reason: "invalid_token"
46
+ });
47
+ }
48
+ if (!((_p = p) != null && _p.sid)) {
49
+ return sendResponse(401, {
50
+ status: "unauthenticated",
51
+ reason: "user_not_found"
52
+ });
53
+ }
54
+ const now = Math.floor(Date.now() / 1000);
55
+ // if (typeof p.exp === "number" && p.exp <= now) {
56
+ if (typeof p.exp === "number" && p.exp >= now) {
57
+ // Delegate to refresh helper; it will handle setting cookies/state or returning an error
58
+ return await getNewRefreshToken(req, ctx, appId, expectedClientId, rt, p, next);
59
+ }
60
+
61
+ // audience checks
62
+ const audOk = Array.isArray(p.aud) && p.aud.includes(expectedClientId) || typeof p.aud === "string" && (p.aud === expectedClientId || p.aud === "account") || p.azp === expectedClientId;
63
+ if (!audOk) {
64
+ return sendResponse(403, {
65
+ status: "forbidden",
66
+ reason: "audience_mismatch"
67
+ });
68
+ }
69
+ setCookieKV(ctx, 'ew', 'rre');
70
+
71
+ // pass data downstream
72
+ (_ref$state = (_ref = ctx).state) != null ? _ref$state : _ref.state = {};
73
+ const tenantId = (_p$cfy_tid = p.cfy_tid) != null ? _p$cfy_tid : p.iss ? new URL(p.iss).pathname.split("/").pop() : null;
74
+ ctx.state.auth = {
75
+ appId,
76
+ userId: (_p$sub = p.sub) != null ? _p$sub : null,
77
+ businessId: (_ref2 = (_p$cfy_bid = p.cfy_bid) != null ? _p$cfy_bid : tenantId) != null ? _ref2 : null,
78
+ tenantId,
79
+ email: (_ref3 = (_p$email = p.email) != null ? _p$email : p.preferred_username) != null ? _ref3 : null,
80
+ name: (_p$name = p.name) != null ? _p$name : undefined,
81
+ roles: (_ref4 = (_p$resource_access$ex = (_p$resource_access = p.resource_access) == null || (_p$resource_access = _p$resource_access[expectedClientId]) == null ? void 0 : _p$resource_access.roles) != null ? _p$resource_access$ex : (_p$realm_access = p.realm_access) == null ? void 0 : _p$realm_access.roles) != null ? _ref4 : [],
82
+ exp: p.exp
83
+ };
84
+ return next();
85
+ };
86
+ async function getNewRefreshToken(req, ctx, appId, expectedClientId, rt, p, next) {
87
+ var _APP_MAP$appId$auth;
88
+ // Attempt server-side refresh using RT
89
+ if (!rt) {
90
+ return sendResponse(401, {
91
+ status: "unauthenticated",
92
+ reason: "expired_no_rt"
93
+ });
94
+ }
95
+
96
+ // Resolve realm for refresh
97
+ let realmId = (_APP_MAP$appId$auth = APP_MAP[appId].auth) == null ? void 0 : _APP_MAP$appId$auth.realm;
98
+ if (!realmId) {
99
+ try {
100
+ const issRealm = p != null && p.iss ? new URL(p.iss).pathname.split("/").pop() : undefined;
101
+ realmId = (p == null ? void 0 : p.cfy_tid) || issRealm || undefined;
102
+ } catch (_unused2) {
103
+ realmId = undefined;
104
+ }
105
+ }
106
+ if (!realmId) {
107
+ return sendResponse(401, {
108
+ status: "unauthenticated",
109
+ reason: "cannot_resolve_realm"
110
+ });
111
+ }
112
+ ctx.info("refreshing token payload ----------------------", {
113
+ realmId,
114
+ expectedClientId,
115
+ rt
116
+ });
117
+
118
+ // Call auth service to refresh
119
+ try {
120
+ var _ref5, _ref5$state, _p2$cfy_tid, _p2$sub, _ref6, _p2$cfy_bid, _ref7, _p2$email, _p2$name, _ref8, _p2$resource_access$e, _p2$resource_access, _p2$realm_access;
121
+ const resp = await fetch(apiURL, {
122
+ method: "POST",
123
+ headers: {
124
+ "Content-Type": "application/json"
125
+ },
126
+ body: JSON.stringify({
127
+ realmId,
128
+ clientId: expectedClientId,
129
+ refresh_token: rt
130
+ })
131
+ });
132
+ if (!resp.ok) {
133
+ const text = await resp.text();
134
+ ctx.warn == null || ctx.warn(`refresh call failed: ${resp.status} ${text}`);
135
+ return sendResponse(401, {
136
+ status: "unauthenticated",
137
+ reason: "refresh_failed"
138
+ });
139
+ }
140
+ const payload = await resp.json();
141
+ const data = (payload == null ? void 0 : payload.data) || {};
142
+ const newAT = data.access_token;
143
+ const newRT = data.refresh_token;
144
+ if (!newAT || !newRT) {
145
+ return sendResponse(401, {
146
+ status: "unauthenticated",
147
+ reason: "invalid_refresh_response"
148
+ });
149
+ }
150
+
151
+ // Set refreshed cookies for client session
152
+ setCookieKV(ctx, `__Secure-session-v1.${appId}.at`, newAT);
153
+ setCookieKV(ctx, `__Secure-session-v1.${appId}.rt`, newRT);
154
+
155
+ // Decode new AT and proceed
156
+ let p2;
157
+ try {
158
+ p2 = jwtDecode(newAT);
159
+ } catch (_unused3) {
160
+ return sendResponse(401, {
161
+ status: "unauthenticated",
162
+ reason: "invalid_new_token"
163
+ });
164
+ }
165
+ const audOk2 = Array.isArray(p2.aud) && p2.aud.includes(expectedClientId) || typeof p2.aud === "string" && (p2.aud === expectedClientId || p2.aud === "account") || p2.azp === expectedClientId;
166
+ if (!audOk2) {
167
+ return sendResponse(403, {
168
+ status: "forbidden",
169
+ reason: "audience_mismatch"
170
+ });
171
+ }
172
+
173
+ // Update downstream auth state with refreshed token
174
+ (_ref5$state = (_ref5 = ctx).state) != null ? _ref5$state : _ref5.state = {};
175
+ const tenantId2 = (_p2$cfy_tid = p2.cfy_tid) != null ? _p2$cfy_tid : p2.iss ? new URL(p2.iss).pathname.split("/").pop() : null;
176
+ ctx.state.auth = {
177
+ appId,
178
+ userId: (_p2$sub = p2.sub) != null ? _p2$sub : null,
179
+ businessId: (_ref6 = (_p2$cfy_bid = p2.cfy_bid) != null ? _p2$cfy_bid : tenantId2) != null ? _ref6 : null,
180
+ tenantId: tenantId2,
181
+ email: (_ref7 = (_p2$email = p2.email) != null ? _p2$email : p2.preferred_username) != null ? _ref7 : null,
182
+ name: (_p2$name = p2.name) != null ? _p2$name : undefined,
183
+ roles: (_ref8 = (_p2$resource_access$e = (_p2$resource_access = p2.resource_access) == null || (_p2$resource_access = _p2$resource_access[expectedClientId]) == null ? void 0 : _p2$resource_access.roles) != null ? _p2$resource_access$e : (_p2$realm_access = p2.realm_access) == null ? void 0 : _p2$realm_access.roles) != null ? _ref8 : [],
184
+ exp: p2.exp
185
+ };
186
+
187
+ // Continue pipeline after refresh
188
+ return next();
189
+ } catch (e) {
190
+ ctx.error == null || ctx.error("refresh exception", e);
191
+ return sendResponse(401, {
192
+ status: "unauthenticated",
193
+ reason: "refresh_exception"
194
+ });
195
+ }
196
+ }
197
+ //# sourceMappingURL=verify-middleware.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"verify-middleware.js","names":["sendResponse","APP_MAP","jwtDecode","setCookieKV","apiURL","process","env","REFRESH_SESSION_URL","parseCookieHeader","header","out","part","split","k","rest","trim","decodeURIComponent","join","verifyMw","req","ctx","next","_APP_MAP$appId","_p","_ref","_ref$state","_p$cfy_tid","_p$sub","_ref2","_p$cfy_bid","_ref3","_p$email","_p$name","_ref4","_p$resource_access$ex","_p$resource_access","_p$realm_access","appId","headers","get","clientId","status","reason","expectedClientId","cookies","at","rt","p","_unused","sid","now","Math","floor","Date","exp","getNewRefreshToken","audOk","Array","isArray","aud","includes","azp","state","tenantId","cfy_tid","iss","URL","pathname","pop","auth","userId","sub","businessId","cfy_bid","email","preferred_username","name","undefined","roles","resource_access","realm_access","_APP_MAP$appId$auth","realmId","realm","issRealm","_unused2","info","_ref5","_ref5$state","_p2$cfy_tid","_p2$sub","_ref6","_p2$cfy_bid","_ref7","_p2$email","_p2$name","_ref8","_p2$resource_access$e","_p2$resource_access","_p2$realm_access","resp","fetch","method","body","JSON","stringify","refresh_token","ok","text","warn","payload","json","data","newAT","access_token","newRT","p2","_unused3","audOk2","tenantId2","e","error"],"sources":["../../../src/middlewares/verify-middleware.ts"],"sourcesContent":["import { HttpResponseInit } from \"@azure/functions\";\nimport { HttpRequest } from \"@azure/functions\";\nimport { InvocationContext } from \"@azure/functions\";\nimport { sendResponse } from \"../utils\";\nimport { IMiddleware } from \"../types/middleware\";\nimport { IAppId } from \"../types/app\";\nimport { APP_MAP } from \"../constants\";\nimport { jwtDecode } from \"jwt-decode\";\nimport { setCookieKV } from \"../utils/cookies\";\n\nconst apiURL = process.env.REFRESH_SESSION_URL || ''\n\nconst parseCookieHeader = (header: string | null | undefined) => {\n const out: Record<string, string> = {};\n if (!header) return out;\n for (const part of header.split(\";\")) {\n const [k, ...rest] = part.trim().split(\"=\");\n if (!k) continue;\n out[k] = decodeURIComponent(rest.join(\"=\") || \"\");\n }\n return out;\n};\n\nexport const verifyMw: IMiddleware = async (\n req: HttpRequest,\n ctx: InvocationContext,\n next: () => Promise<HttpResponseInit>\n): Promise<HttpResponseInit> => {\n const appId = req.headers.get(\"app-id\") as IAppId | undefined;\n\n if (!appId || !APP_MAP?.[appId]?.clientId) {\n return sendResponse(400, { status: \"bad_request\", reason: \"invalid_app\" });\n }\n \n const expectedClientId = APP_MAP[appId].clientId;\n\n // cookies\n const cookies = parseCookieHeader(req.headers.get(\"cookie\"));\n const at = cookies[`__Secure-session-v1.${appId}.at`];\n const rt = cookies[`__Secure-session-v1.${appId}.rt`];\n\n if (!at && !rt) {\n return sendResponse(401, { status: \"unauthenticated\", reason: \"no_tokens\" });\n }\n\n // decode/verify (lightweight; replace with your verifyJsonWebToken if you have it)\n let p: any;\n try {\n p = jwtDecode(at);\n } catch {\n return sendResponse(401, { status: \"unauthenticated\", reason: \"invalid_token\" });\n }\n\n if (!p?.sid) {\n return sendResponse(401, { status: \"unauthenticated\", reason: \"user_not_found\" });\n }\n\n const now = Math.floor(Date.now() / 1000);\n // if (typeof p.exp === \"number\" && p.exp <= now) {\n if (typeof p.exp === \"number\" && p.exp >= now) {\n // Delegate to refresh helper; it will handle setting cookies/state or returning an error\n return await getNewRefreshToken(req, ctx, appId, expectedClientId, rt, p, next);\n }\n\n // audience checks\n const audOk =\n (Array.isArray(p.aud) && p.aud.includes(expectedClientId)) ||\n (typeof p.aud === \"string\" && (p.aud === expectedClientId || p.aud === \"account\")) ||\n p.azp === expectedClientId;\n\n if (!audOk) {\n return sendResponse(403, { status: \"forbidden\", reason: \"audience_mismatch\" });\n }\n\n\n setCookieKV(ctx, 'ew','rre');\n\n // pass data downstream\n (ctx as any).state ??= {};\n const tenantId = p.cfy_tid ?? (p.iss ? new URL(p.iss).pathname.split(\"/\").pop() : null);\n\n (ctx as any).state.auth = {\n appId,\n userId: p.sub ?? null,\n businessId: p.cfy_bid ?? tenantId ?? null,\n tenantId,\n email: p.email ?? p.preferred_username ?? null,\n name: p.name ?? undefined,\n roles: p.resource_access?.[expectedClientId]?.roles ?? p.realm_access?.roles ?? [],\n exp: p.exp,\n };\n\n return next();\n};\n\n\n\nasync function getNewRefreshToken(\n req: HttpRequest,\n ctx: InvocationContext,\n appId: IAppId,\n expectedClientId: string,\n rt: string | undefined,\n p: any,\n next: () => Promise<HttpResponseInit>\n): Promise<HttpResponseInit> {\n // Attempt server-side refresh using RT\n if (!rt) {\n return sendResponse(401, { status: \"unauthenticated\", reason: \"expired_no_rt\" });\n }\n\n // Resolve realm for refresh\n let realmId: string | undefined = APP_MAP[appId].auth?.realm;\n if (!realmId) {\n try {\n const issRealm = p?.iss ? new URL(p.iss).pathname.split(\"/\").pop() : undefined;\n realmId = (p as any)?.cfy_tid || issRealm || undefined;\n } catch {\n realmId = undefined;\n }\n }\n\n if (!realmId) {\n return sendResponse(401, { status: \"unauthenticated\", reason: \"cannot_resolve_realm\" });\n }\n\n ctx.info(\"refreshing token payload ----------------------\", {\n realmId,\n expectedClientId,\n rt\n });\n\n\n // Call auth service to refresh\n try {\n const resp = await fetch(apiURL, {\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ \n realmId, \n clientId: expectedClientId, \n refresh_token: rt\n })\n });\n\n if (!resp.ok) {\n const text = await resp.text();\n ctx.warn?.(`refresh call failed: ${resp.status} ${text}`);\n return sendResponse(401, { status: \"unauthenticated\", reason: \"refresh_failed\" });\n }\n\n\n const payload = await resp.json();\n const data = payload?.data || {};\n const newAT = data.access_token as string | undefined;\n const newRT = data.refresh_token as string | undefined;\n if (!newAT || !newRT) {\n return sendResponse(401, { status: \"unauthenticated\", reason: \"invalid_refresh_response\" });\n }\n\n // Set refreshed cookies for client session\n setCookieKV(ctx, `__Secure-session-v1.${appId}.at`, newAT);\n setCookieKV(ctx, `__Secure-session-v1.${appId}.rt`, newRT);\n\n // Decode new AT and proceed\n let p2: any;\n try { p2 = jwtDecode(newAT); } catch { return sendResponse(401, { status: \"unauthenticated\", reason: \"invalid_new_token\" }); }\n\n const audOk2 =\n (Array.isArray(p2.aud) && p2.aud.includes(expectedClientId)) ||\n (typeof p2.aud === \"string\" && (p2.aud === expectedClientId || p2.aud === \"account\")) ||\n p2.azp === expectedClientId;\n if (!audOk2) {\n return sendResponse(403, { status: \"forbidden\", reason: \"audience_mismatch\" });\n }\n\n // Update downstream auth state with refreshed token\n (ctx as any).state ??= {};\n const tenantId2 = p2.cfy_tid ?? (p2.iss ? new URL(p2.iss).pathname.split(\"/\").pop() : null);\n (ctx as any).state.auth = {\n appId,\n userId: p2.sub ?? null,\n businessId: p2.cfy_bid ?? tenantId2 ?? null,\n tenantId: tenantId2,\n email: p2.email ?? p2.preferred_username ?? null,\n name: p2.name ?? undefined,\n roles: p2.resource_access?.[expectedClientId]?.roles ?? p2.realm_access?.roles ?? [],\n exp: p2.exp,\n };\n\n // Continue pipeline after refresh\n return next();\n } catch (e) {\n ctx.error?.(\"refresh exception\", e as any);\n return sendResponse(401, { status: \"unauthenticated\", reason: \"refresh_exception\" });\n }\n}"],"mappings":"AAGA,SAASA,YAAY,QAAQ,UAAU;AAGvC,SAASC,OAAO,QAAQ,cAAc;AACtC,SAASC,SAAS,QAAQ,YAAY;AACtC,SAASC,WAAW,QAAQ,kBAAkB;AAE9C,MAAMC,MAAM,GAAGC,OAAO,CAACC,GAAG,CAACC,mBAAmB,IAAI,EAAE;AAEpD,MAAMC,iBAAiB,GAAIC,MAAiC,IAAK;EAC/D,MAAMC,GAA2B,GAAG,CAAC,CAAC;EACtC,IAAI,CAACD,MAAM,EAAE,OAAOC,GAAG;EACvB,KAAK,MAAMC,IAAI,IAAIF,MAAM,CAACG,KAAK,CAAC,GAAG,CAAC,EAAE;IACpC,MAAM,CAACC,CAAC,EAAE,GAAGC,IAAI,CAAC,GAAGH,IAAI,CAACI,IAAI,CAAC,CAAC,CAACH,KAAK,CAAC,GAAG,CAAC;IAC3C,IAAI,CAACC,CAAC,EAAE;IACRH,GAAG,CAACG,CAAC,CAAC,GAAGG,kBAAkB,CAACF,IAAI,CAACG,IAAI,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC;EACnD;EACA,OAAOP,GAAG;AACZ,CAAC;AAED,OAAO,MAAMQ,QAAqB,GAAG,MAAAA,CACnCC,GAAgB,EAChBC,GAAsB,EACtBC,IAAqC,KACP;EAAA,IAAAC,cAAA,EAAAC,EAAA,EAAAC,IAAA,EAAAC,UAAA,EAAAC,UAAA,EAAAC,MAAA,EAAAC,KAAA,EAAAC,UAAA,EAAAC,KAAA,EAAAC,QAAA,EAAAC,OAAA,EAAAC,KAAA,EAAAC,qBAAA,EAAAC,kBAAA,EAAAC,eAAA;EAC9B,MAAMC,KAAK,GAAGlB,GAAG,CAACmB,OAAO,CAACC,GAAG,CAAC,QAAQ,CAAuB;EAE7D,IAAI,CAACF,KAAK,IAAI,EAACpC,OAAO,aAAAqB,cAAA,GAAPrB,OAAO,CAAGoC,KAAK,CAAC,aAAhBf,cAAA,CAAkBkB,QAAQ,GAAE;IACzC,OAAOxC,YAAY,CAAC,GAAG,EAAE;MAAEyC,MAAM,EAAE,aAAa;MAAEC,MAAM,EAAE;IAAc,CAAC,CAAC;EAC5E;EAEA,MAAMC,gBAAgB,GAAG1C,OAAO,CAACoC,KAAK,CAAC,CAACG,QAAQ;;EAEhD;EACA,MAAMI,OAAO,GAAGpC,iBAAiB,CAACW,GAAG,CAACmB,OAAO,CAACC,GAAG,CAAC,QAAQ,CAAC,CAAC;EAC5D,MAAMM,EAAE,GAAGD,OAAO,CAAC,uBAAuBP,KAAK,KAAK,CAAC;EACrD,MAAMS,EAAE,GAAGF,OAAO,CAAC,uBAAuBP,KAAK,KAAK,CAAC;EAErD,IAAI,CAACQ,EAAE,IAAI,CAACC,EAAE,EAAE;IACd,OAAO9C,YAAY,CAAC,GAAG,EAAE;MAAEyC,MAAM,EAAE,iBAAiB;MAAEC,MAAM,EAAE;IAAY,CAAC,CAAC;EAC9E;;EAEA;EACA,IAAIK,CAAM;EACV,IAAI;IACFA,CAAC,GAAG7C,SAAS,CAAC2C,EAAE,CAAC;EACnB,CAAC,CAAC,OAAAG,OAAA,EAAM;IACN,OAAOhD,YAAY,CAAC,GAAG,EAAE;MAAEyC,MAAM,EAAE,iBAAiB;MAAEC,MAAM,EAAE;IAAgB,CAAC,CAAC;EAClF;EAEA,IAAI,GAAAnB,EAAA,GAACwB,CAAC,aAADxB,EAAA,CAAG0B,GAAG,GAAE;IACX,OAAOjD,YAAY,CAAC,GAAG,EAAE;MAAEyC,MAAM,EAAE,iBAAiB;MAAEC,MAAM,EAAE;IAAiB,CAAC,CAAC;EACnF;EAEA,MAAMQ,GAAG,GAAGC,IAAI,CAACC,KAAK,CAACC,IAAI,CAACH,GAAG,CAAC,CAAC,GAAG,IAAI,CAAC;EACzC;EACA,IAAI,OAAOH,CAAC,CAACO,GAAG,KAAK,QAAQ,IAAIP,CAAC,CAACO,GAAG,IAAIJ,GAAG,EAAE;IAC7C;IACA,OAAO,MAAMK,kBAAkB,CAACpC,GAAG,EAAEC,GAAG,EAAEiB,KAAK,EAAEM,gBAAgB,EAAEG,EAAE,EAAEC,CAAC,EAAE1B,IAAI,CAAC;EACjF;;EAEA;EACA,MAAMmC,KAAK,GACRC,KAAK,CAACC,OAAO,CAACX,CAAC,CAACY,GAAG,CAAC,IAAIZ,CAAC,CAACY,GAAG,CAACC,QAAQ,CAACjB,gBAAgB,CAAC,IACxD,OAAOI,CAAC,CAACY,GAAG,KAAK,QAAQ,KAAKZ,CAAC,CAACY,GAAG,KAAKhB,gBAAgB,IAAII,CAAC,CAACY,GAAG,KAAK,SAAS,CAAE,IAClFZ,CAAC,CAACc,GAAG,KAAKlB,gBAAgB;EAE5B,IAAI,CAACa,KAAK,EAAE;IACV,OAAOxD,YAAY,CAAC,GAAG,EAAE;MAAEyC,MAAM,EAAE,WAAW;MAAEC,MAAM,EAAE;IAAoB,CAAC,CAAC;EAChF;EAGAvC,WAAW,CAACiB,GAAG,EAAE,IAAI,EAAC,KAAK,CAAC;;EAE5B;EACA,CAAAK,UAAA,IAAAD,IAAA,GAACJ,GAAG,EAAS0C,KAAK,YAAArC,UAAA,GAAlBD,IAAA,CAAasC,KAAK,GAAK,CAAC,CAAC;EACzB,MAAMC,QAAQ,IAAArC,UAAA,GAAGqB,CAAC,CAACiB,OAAO,YAAAtC,UAAA,GAAKqB,CAAC,CAACkB,GAAG,GAAG,IAAIC,GAAG,CAACnB,CAAC,CAACkB,GAAG,CAAC,CAACE,QAAQ,CAACvD,KAAK,CAAC,GAAG,CAAC,CAACwD,GAAG,CAAC,CAAC,GAAG,IAAK;EAEtFhD,GAAG,CAAS0C,KAAK,CAACO,IAAI,GAAG;IACxBhC,KAAK;IACLiC,MAAM,GAAA3C,MAAA,GAAEoB,CAAC,CAACwB,GAAG,YAAA5C,MAAA,GAAI,IAAI;IACrB6C,UAAU,GAAA5C,KAAA,IAAAC,UAAA,GAAEkB,CAAC,CAAC0B,OAAO,YAAA5C,UAAA,GAAIkC,QAAQ,YAAAnC,KAAA,GAAI,IAAI;IACzCmC,QAAQ;IACRW,KAAK,GAAA5C,KAAA,IAAAC,QAAA,GAAEgB,CAAC,CAAC2B,KAAK,YAAA3C,QAAA,GAAIgB,CAAC,CAAC4B,kBAAkB,YAAA7C,KAAA,GAAI,IAAI;IAC9C8C,IAAI,GAAA5C,OAAA,GAAEe,CAAC,CAAC6B,IAAI,YAAA5C,OAAA,GAAI6C,SAAS;IACzBC,KAAK,GAAA7C,KAAA,IAAAC,qBAAA,IAAAC,kBAAA,GAAEY,CAAC,CAACgC,eAAe,cAAA5C,kBAAA,GAAjBA,kBAAA,CAAoBQ,gBAAgB,CAAC,qBAArCR,kBAAA,CAAuC2C,KAAK,YAAA5C,qBAAA,IAAAE,eAAA,GAAIW,CAAC,CAACiC,YAAY,qBAAd5C,eAAA,CAAgB0C,KAAK,YAAA7C,KAAA,GAAI,EAAE;IAClFqB,GAAG,EAAEP,CAAC,CAACO;EACT,CAAC;EAED,OAAOjC,IAAI,CAAC,CAAC;AACf,CAAC;AAID,eAAekC,kBAAkBA,CAC/BpC,GAAgB,EAChBC,GAAsB,EACtBiB,KAAa,EACbM,gBAAwB,EACxBG,EAAsB,EACtBC,CAAM,EACN1B,IAAqC,EACV;EAAA,IAAA4D,mBAAA;EAC3B;EACA,IAAI,CAACnC,EAAE,EAAE;IACP,OAAO9C,YAAY,CAAC,GAAG,EAAE;MAAEyC,MAAM,EAAE,iBAAiB;MAAEC,MAAM,EAAE;IAAgB,CAAC,CAAC;EAClF;;EAEA;EACA,IAAIwC,OAA2B,IAAAD,mBAAA,GAAGhF,OAAO,CAACoC,KAAK,CAAC,CAACgC,IAAI,qBAAnBY,mBAAA,CAAqBE,KAAK;EAC5D,IAAI,CAACD,OAAO,EAAE;IACZ,IAAI;MACF,MAAME,QAAQ,GAAGrC,CAAC,YAADA,CAAC,CAAEkB,GAAG,GAAG,IAAIC,GAAG,CAACnB,CAAC,CAACkB,GAAG,CAAC,CAACE,QAAQ,CAACvD,KAAK,CAAC,GAAG,CAAC,CAACwD,GAAG,CAAC,CAAC,GAAGS,SAAS;MAC9EK,OAAO,GAAG,CAACnC,CAAC,oBAADA,CAAC,CAAUiB,OAAO,KAAIoB,QAAQ,IAAIP,SAAS;IACxD,CAAC,CAAC,OAAAQ,QAAA,EAAM;MACNH,OAAO,GAAGL,SAAS;IACrB;EACF;EAEA,IAAI,CAACK,OAAO,EAAE;IACZ,OAAOlF,YAAY,CAAC,GAAG,EAAE;MAAEyC,MAAM,EAAE,iBAAiB;MAAEC,MAAM,EAAE;IAAuB,CAAC,CAAC;EACzF;EAEAtB,GAAG,CAACkE,IAAI,CAAC,iDAAiD,EAAE;IAC1DJ,OAAO;IACPvC,gBAAgB;IAChBG;EACF,CAAC,CAAC;;EAGF;EACA,IAAI;IAAA,IAAAyC,KAAA,EAAAC,WAAA,EAAAC,WAAA,EAAAC,OAAA,EAAAC,KAAA,EAAAC,WAAA,EAAAC,KAAA,EAAAC,SAAA,EAAAC,QAAA,EAAAC,KAAA,EAAAC,qBAAA,EAAAC,mBAAA,EAAAC,gBAAA;IACF,MAAMC,IAAI,GAAG,MAAMC,KAAK,CAACjG,MAAM,EAAE;MAC/BkG,MAAM,EAAE,MAAM;MACdhE,OAAO,EAAE;QAAE,cAAc,EAAE;MAAmB,CAAC;MAC/CiE,IAAI,EAAEC,IAAI,CAACC,SAAS,CAAC;QACnBvB,OAAO;QACP1C,QAAQ,EAAEG,gBAAgB;QAC1B+D,aAAa,EAAE5D;MACjB,CAAC;IACH,CAAC,CAAC;IAEF,IAAI,CAACsD,IAAI,CAACO,EAAE,EAAE;MACZ,MAAMC,IAAI,GAAG,MAAMR,IAAI,CAACQ,IAAI,CAAC,CAAC;MAC9BxF,GAAG,CAACyF,IAAI,YAARzF,GAAG,CAACyF,IAAI,CAAG,wBAAwBT,IAAI,CAAC3D,MAAM,IAAImE,IAAI,EAAE,CAAC;MACzD,OAAO5G,YAAY,CAAC,GAAG,EAAE;QAAEyC,MAAM,EAAE,iBAAiB;QAAEC,MAAM,EAAE;MAAiB,CAAC,CAAC;IACnF;IAGA,MAAMoE,OAAO,GAAG,MAAMV,IAAI,CAACW,IAAI,CAAC,CAAC;IACjC,MAAMC,IAAI,GAAG,CAAAF,OAAO,oBAAPA,OAAO,CAAEE,IAAI,KAAI,CAAC,CAAC;IAChC,MAAMC,KAAK,GAAGD,IAAI,CAACE,YAAkC;IACrD,MAAMC,KAAK,GAAGH,IAAI,CAACN,aAAmC;IACtD,IAAI,CAACO,KAAK,IAAI,CAACE,KAAK,EAAE;MACpB,OAAOnH,YAAY,CAAC,GAAG,EAAE;QAAEyC,MAAM,EAAE,iBAAiB;QAAEC,MAAM,EAAE;MAA2B,CAAC,CAAC;IAC7F;;IAEA;IACAvC,WAAW,CAACiB,GAAG,EAAE,uBAAuBiB,KAAK,KAAK,EAAE4E,KAAK,CAAC;IAC1D9G,WAAW,CAACiB,GAAG,EAAE,uBAAuBiB,KAAK,KAAK,EAAE8E,KAAK,CAAC;;IAE1D;IACA,IAAIC,EAAO;IACX,IAAI;MAAEA,EAAE,GAAGlH,SAAS,CAAC+G,KAAK,CAAC;IAAE,CAAC,CAAC,OAAAI,QAAA,EAAM;MAAE,OAAOrH,YAAY,CAAC,GAAG,EAAE;QAAEyC,MAAM,EAAE,iBAAiB;QAAEC,MAAM,EAAE;MAAoB,CAAC,CAAC;IAAE;IAE7H,MAAM4E,MAAM,GACT7D,KAAK,CAACC,OAAO,CAAC0D,EAAE,CAACzD,GAAG,CAAC,IAAIyD,EAAE,CAACzD,GAAG,CAACC,QAAQ,CAACjB,gBAAgB,CAAC,IAC1D,OAAOyE,EAAE,CAACzD,GAAG,KAAK,QAAQ,KAAKyD,EAAE,CAACzD,GAAG,KAAKhB,gBAAgB,IAAIyE,EAAE,CAACzD,GAAG,KAAK,SAAS,CAAE,IACrFyD,EAAE,CAACvD,GAAG,KAAKlB,gBAAgB;IAC7B,IAAI,CAAC2E,MAAM,EAAE;MACX,OAAOtH,YAAY,CAAC,GAAG,EAAE;QAAEyC,MAAM,EAAE,WAAW;QAAEC,MAAM,EAAE;MAAoB,CAAC,CAAC;IAChF;;IAEA;IACA,CAAA8C,WAAA,IAAAD,KAAA,GAACnE,GAAG,EAAS0C,KAAK,YAAA0B,WAAA,GAAlBD,KAAA,CAAazB,KAAK,GAAK,CAAC,CAAC;IACzB,MAAMyD,SAAS,IAAA9B,WAAA,GAAG2B,EAAE,CAACpD,OAAO,YAAAyB,WAAA,GAAK2B,EAAE,CAACnD,GAAG,GAAG,IAAIC,GAAG,CAACkD,EAAE,CAACnD,GAAG,CAAC,CAACE,QAAQ,CAACvD,KAAK,CAAC,GAAG,CAAC,CAACwD,GAAG,CAAC,CAAC,GAAG,IAAK;IAC1FhD,GAAG,CAAS0C,KAAK,CAACO,IAAI,GAAG;MACxBhC,KAAK;MACLiC,MAAM,GAAAoB,OAAA,GAAE0B,EAAE,CAAC7C,GAAG,YAAAmB,OAAA,GAAI,IAAI;MACtBlB,UAAU,GAAAmB,KAAA,IAAAC,WAAA,GAAEwB,EAAE,CAAC3C,OAAO,YAAAmB,WAAA,GAAI2B,SAAS,YAAA5B,KAAA,GAAI,IAAI;MAC3C5B,QAAQ,EAAEwD,SAAS;MACnB7C,KAAK,GAAAmB,KAAA,IAAAC,SAAA,GAAEsB,EAAE,CAAC1C,KAAK,YAAAoB,SAAA,GAAIsB,EAAE,CAACzC,kBAAkB,YAAAkB,KAAA,GAAI,IAAI;MAChDjB,IAAI,GAAAmB,QAAA,GAAEqB,EAAE,CAACxC,IAAI,YAAAmB,QAAA,GAAIlB,SAAS;MAC1BC,KAAK,GAAAkB,KAAA,IAAAC,qBAAA,IAAAC,mBAAA,GAAEkB,EAAE,CAACrC,eAAe,cAAAmB,mBAAA,GAAlBA,mBAAA,CAAqBvD,gBAAgB,CAAC,qBAAtCuD,mBAAA,CAAwCpB,KAAK,YAAAmB,qBAAA,IAAAE,gBAAA,GAAIiB,EAAE,CAACpC,YAAY,qBAAfmB,gBAAA,CAAiBrB,KAAK,YAAAkB,KAAA,GAAI,EAAE;MACpF1C,GAAG,EAAE8D,EAAE,CAAC9D;IACV,CAAC;;IAED;IACA,OAAOjC,IAAI,CAAC,CAAC;EACf,CAAC,CAAC,OAAOmG,CAAC,EAAE;IACVpG,GAAG,CAACqG,KAAK,YAATrG,GAAG,CAACqG,KAAK,CAAG,mBAAmB,EAAED,CAAQ,CAAC;IAC1C,OAAOxH,YAAY,CAAC,GAAG,EAAE;MAAEyC,MAAM,EAAE,iBAAiB;MAAEC,MAAM,EAAE;IAAoB,CAAC,CAAC;EACtF;AACF","ignoreList":[]}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=app.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"app.js","names":[],"sources":["../../../src/types/app.ts"],"sourcesContent":["export type IAppId = \"3238hxa2\";\n\nexport interface IDomainMappings {\n domains: Record<string, string[]>;\n clientId: string;\n appId: string;\n name: string;\n exclude: Record<string, string[]>;\n cookie: {\n prefix: string;\n domain: {\n local: string | null;\n dev: string;\n staging: string;\n prod: string;\n };\n path: string;\n sameSite: string;\n secure: boolean;\n httpOnly: boolean;\n maxAgeSec: { sid: number; rt: number };\n };\n auth?: {\n realm: string;\n clientId: string;\n };\n}"],"mappings":"","ignoreList":[]}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=middleware.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"middleware.js","names":[],"sources":["../../../src/types/middleware.ts"],"sourcesContent":["import { HttpRequest, HttpResponseInit, InvocationContext } from \"@azure/functions\";\n\n\nexport type IMiddleware = (\n req: HttpRequest,\n ctx: InvocationContext,\n next: () => Promise<HttpResponseInit>\n) => Promise<HttpResponseInit>;\n\nexport type IHandler = (req: HttpRequest, ctx: InvocationContext) => Promise<HttpResponseInit>;"],"mappings":"","ignoreList":[]}
@@ -0,0 +1,24 @@
1
+ export function setCookieKV(ctx, key, value) {
2
+ var _ref, _ref$CTX_COOKIES_OBJ, _ref2, _ref2$CTX_COOKIES;
3
+ // Object-cookie bag (preferred)
4
+ const CTX_COOKIES_OBJ = Symbol.for("cfy.resCookies.obj");
5
+ // @ts-ignore
6
+ const objBag = (_ref$CTX_COOKIES_OBJ = (_ref = ctx)[CTX_COOKIES_OBJ]) != null ? _ref$CTX_COOKIES_OBJ : _ref[CTX_COOKIES_OBJ] = [];
7
+ objBag.push({
8
+ name: key,
9
+ value,
10
+ path: "/",
11
+ httpOnly: true,
12
+ secure: true,
13
+ // drop to false if testing on http://
14
+ sameSite: "None",
15
+ // use "Lax" for same-site
16
+ maxAge: 300 // seconds
17
+ });
18
+
19
+ // (Optional) Keep your string fallback too:
20
+ const CTX_COOKIES = Symbol.for("cfy.resCookies");
21
+ const strBag = (_ref2$CTX_COOKIES = (_ref2 = ctx)[CTX_COOKIES]) != null ? _ref2$CTX_COOKIES : _ref2[CTX_COOKIES] = [];
22
+ strBag.push(`${encodeURIComponent(key)}=${encodeURIComponent(value)}; Path=/; HttpOnly; SameSite=None; Secure; Max-Age=300`);
23
+ }
24
+ //# sourceMappingURL=cookies.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cookies.js","names":["setCookieKV","ctx","key","value","_ref","_ref$CTX_COOKIES_OBJ","_ref2","_ref2$CTX_COOKIES","CTX_COOKIES_OBJ","Symbol","for","objBag","push","name","path","httpOnly","secure","sameSite","maxAge","CTX_COOKIES","strBag","encodeURIComponent"],"sources":["../../../src/utils/cookies.ts"],"sourcesContent":["import { InvocationContext } from \"@azure/functions\";\n\nexport function setCookieKV(ctx: InvocationContext, key: string, value: string): void {\n // Object-cookie bag (preferred)\n const CTX_COOKIES_OBJ = Symbol.for(\"cfy.resCookies.obj\");\n // @ts-ignore\n const objBag = ((ctx as any)[CTX_COOKIES_OBJ] ??= [] as HttpCookie[]);\n objBag.push({\n name: key,\n value,\n path: \"/\",\n httpOnly: true,\n secure: true, // drop to false if testing on http://\n sameSite: \"None\", // use \"Lax\" for same-site\n maxAge: 300, // seconds\n });\n\n // (Optional) Keep your string fallback too:\n const CTX_COOKIES = Symbol.for(\"cfy.resCookies\");\n const strBag = ((ctx as any)[CTX_COOKIES] ??= [] as string[]);\n strBag.push(\n `${encodeURIComponent(key)}=${encodeURIComponent(value)}; Path=/; HttpOnly; SameSite=None; Secure; Max-Age=300`\n );\n}"],"mappings":"AAEA,OAAO,SAASA,WAAWA,CAACC,GAAsB,EAAEC,GAAW,EAAEC,KAAa,EAAQ;EAAA,IAAAC,IAAA,EAAAC,oBAAA,EAAAC,KAAA,EAAAC,iBAAA;EACpF;EACA,MAAMC,eAAe,GAAGC,MAAM,CAACC,GAAG,CAAC,oBAAoB,CAAC;EACxD;EACA,MAAMC,MAAM,IAAAN,oBAAA,GAAI,CAAAD,IAAA,GAACH,GAAG,EAASO,eAAe,CAAC,YAAAH,oBAAA,GAA7BD,IAAA,CAAaI,eAAe,CAAC,GAAK,EAAmB;EACrEG,MAAM,CAACC,IAAI,CAAC;IACRC,IAAI,EAAEX,GAAG;IACTC,KAAK;IACLW,IAAI,EAAE,GAAG;IACTC,QAAQ,EAAE,IAAI;IACdC,MAAM,EAAE,IAAI;IAAQ;IACpBC,QAAQ,EAAE,MAAM;IAAI;IACpBC,MAAM,EAAE,GAAG,CAAS;EACxB,CAAC,CAAC;;EAEF;EACA,MAAMC,WAAW,GAAGV,MAAM,CAACC,GAAG,CAAC,gBAAgB,CAAC;EAChD,MAAMU,MAAM,IAAAb,iBAAA,GAAI,CAAAD,KAAA,GAACL,GAAG,EAASkB,WAAW,CAAC,YAAAZ,iBAAA,GAAzBD,KAAA,CAAaa,WAAW,CAAC,GAAK,EAAe;EAC7DC,MAAM,CAACR,IAAI,CACP,GAAGS,kBAAkB,CAACnB,GAAG,CAAC,IAAImB,kBAAkB,CAAClB,KAAK,CAAC,wDAC3D,CAAC;AACH","ignoreList":[]}
@@ -3,4 +3,5 @@ export * from './response';
3
3
  export * from './initializers';
4
4
  export * from './mapper';
5
5
  export * from './jwt';
6
+ export * from './middleware';
6
7
  //# sourceMappingURL=index.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","names":[],"sources":["../../../src/utils/index.ts"],"sourcesContent":["export * from './secrets';\nexport * from './response';\nexport * from './initializers';\nexport * from './mapper';\nexport * from './jwt';"],"mappings":"AAAA,cAAc,WAAW;AACzB,cAAc,YAAY;AAC1B,cAAc,gBAAgB;AAC9B,cAAc,UAAU;AACxB,cAAc,OAAO","ignoreList":[]}
1
+ {"version":3,"file":"index.js","names":[],"sources":["../../../src/utils/index.ts"],"sourcesContent":["export * from './secrets';\nexport * from './response';\nexport * from './initializers';\nexport * from './mapper';\nexport * from './jwt';\nexport * from './middleware';\n"],"mappings":"AAAA,cAAc,WAAW;AACzB,cAAc,YAAY;AAC1B,cAAc,gBAAgB;AAC9B,cAAc,UAAU;AACxB,cAAc,OAAO;AACrB,cAAc,cAAc","ignoreList":[]}
@@ -0,0 +1,65 @@
1
+ function _extends() { return _extends = Object.assign ? Object.assign.bind() : function (n) { for (var e = 1; e < arguments.length; e++) { var t = arguments[e]; for (var r in t) ({}).hasOwnProperty.call(t, r) && (n[r] = t[r]); } return n; }, _extends.apply(null, arguments); }
2
+ /**
3
+ * Compose Azure Functions middlewares (Koa-style).
4
+ * Each middleware gets (req, ctx, next) and must either:
5
+ * - `return await next()` to pass-through, or
6
+ * - `return <HttpResponseInit>` to short-circuit.
7
+ *
8
+ * Any headers/cookies accumulated on ctx via Symbol.for("cfy.resHeaders"/"cfy.resCookies")
9
+ * are merged into the final response.
10
+ */
11
+ // ---- withMW (kept small; merges any ctx headers/cookies if you use them) ----
12
+ export function withMW(middlewares, handler) {
13
+ return async (req, ctx) => {
14
+ var _res$headers;
15
+ const stack = [...middlewares, async (r, c) => handler(r, c)];
16
+ let index = -1;
17
+ const dispatch = async i => {
18
+ if (i <= index) throw new Error("next() called multiple times");
19
+ index = i;
20
+ const fn = stack[i];
21
+ if (!fn) throw new Error("No handler in middleware stack");
22
+
23
+ // next always returns a HttpResponseInit
24
+ const next = () => dispatch(i + 1);
25
+ const result = await fn(req, ctx, next);
26
+ if (result === undefined) {
27
+ throw new Error("Middleware must return a response or `return await next()`");
28
+ }
29
+ return result;
30
+ };
31
+ const res = await dispatch(0);
32
+
33
+ // optional: merge bags if you set them elsewhere
34
+ const CTX_HEADERS = Symbol.for("cfy.resHeaders");
35
+ const CTX_COOKIES = Symbol.for("cfy.resCookies"); // string[]
36
+ const CTX_COOKIES_OBJ = Symbol.for("cfy.resCookies.obj"); // HttpCookie[]
37
+
38
+ const merged = _extends({}, res, {
39
+ headers: _extends({}, (_res$headers = res.headers) != null ? _res$headers : {})
40
+ });
41
+
42
+ // merge cookies as objects (preferred by Azure Functions)
43
+ // @ts-ignore
44
+ const objCookies = ctx[CTX_COOKIES_OBJ];
45
+ if (objCookies != null && objCookies.length) {
46
+ var _res$cookies;
47
+ merged.cookies = [...((_res$cookies = res.cookies) != null ? _res$cookies : []), ...objCookies];
48
+ }
49
+
50
+ // (optional) header fallback for environments that expect Set-Cookie header(s)
51
+ const cookies = ctx[CTX_COOKIES];
52
+ if (cookies != null && cookies.length) {
53
+ var _h$SetCookie;
54
+ const h = merged.headers;
55
+ const existing = (_h$SetCookie = h["Set-Cookie"]) != null ? _h$SetCookie : h["set-cookie"];
56
+ h["Set-Cookie"] = existing ? Array.isArray(existing) ? existing.concat(cookies) : [existing, ...cookies] : cookies;
57
+ }
58
+
59
+ // merge extra headers if you use that bag
60
+ const extra = ctx[CTX_HEADERS];
61
+ if (extra) for (const [k, v] of Object.entries(extra)) merged.headers[k] = v;
62
+ return merged;
63
+ };
64
+ }
65
+ //# sourceMappingURL=middleware.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"middleware.js","names":["withMW","middlewares","handler","req","ctx","_res$headers","stack","r","c","index","dispatch","i","Error","fn","next","result","undefined","res","CTX_HEADERS","Symbol","for","CTX_COOKIES","CTX_COOKIES_OBJ","merged","_extends","headers","objCookies","length","_res$cookies","cookies","_h$SetCookie","h","existing","Array","isArray","concat","extra","k","v","Object","entries"],"sources":["../../../src/utils/middleware.ts"],"sourcesContent":["import { app, HttpRequest, HttpResponseInit, InvocationContext } from \"@azure/functions\";\nimport { IHandler, IMiddleware } from \"../types/middleware\";\n\n/**\n * Compose Azure Functions middlewares (Koa-style).\n * Each middleware gets (req, ctx, next) and must either:\n * - `return await next()` to pass-through, or\n * - `return <HttpResponseInit>` to short-circuit.\n *\n * Any headers/cookies accumulated on ctx via Symbol.for(\"cfy.resHeaders\"/\"cfy.resCookies\")\n * are merged into the final response.\n */\n// ---- withMW (kept small; merges any ctx headers/cookies if you use them) ----\nexport function withMW(middlewares: IMiddleware[], handler: IHandler) {\n return async (req: HttpRequest, ctx: InvocationContext): Promise<HttpResponseInit> => {\n const stack: IMiddleware[] = [...middlewares, async (r, c) => handler(r, c)];\n\n let index = -1;\n const dispatch = async (i: number): Promise<HttpResponseInit> => {\n if (i <= index) throw new Error(\"next() called multiple times\");\n index = i;\n\n const fn = stack[i];\n if (!fn) throw new Error(\"No handler in middleware stack\");\n\n // next always returns a HttpResponseInit\n const next = () => dispatch(i + 1);\n const result = await fn(req, ctx, next);\n\n if (result === undefined) {\n throw new Error(\"Middleware must return a response or `return await next()`\");\n }\n return result;\n };\n\n const res = await dispatch(0);\n\n // optional: merge bags if you set them elsewhere\n const CTX_HEADERS = Symbol.for(\"cfy.resHeaders\");\n const CTX_COOKIES = Symbol.for(\"cfy.resCookies\"); // string[]\n const CTX_COOKIES_OBJ = Symbol.for(\"cfy.resCookies.obj\"); // HttpCookie[]\n\n const merged: HttpResponseInit = { ...res, headers: { ...(res.headers ?? {}) } };\n\n // merge cookies as objects (preferred by Azure Functions)\n // @ts-ignore\n const objCookies = (ctx as any)[CTX_COOKIES_OBJ] as HttpCookie[] | undefined;\n if (objCookies?.length) {\n merged.cookies = [...(res.cookies ?? []), ...objCookies];\n }\n\n // (optional) header fallback for environments that expect Set-Cookie header(s)\n const cookies = (ctx as any)[CTX_COOKIES] as string[] | undefined;\n if (cookies?.length) {\n const h = merged.headers as any;\n const existing = h[\"Set-Cookie\"] ?? h[\"set-cookie\"];\n h[\"Set-Cookie\"] = existing\n ? (Array.isArray(existing) ? existing.concat(cookies) : [existing, ...cookies])\n : cookies;\n }\n\n // merge extra headers if you use that bag\n const extra = (ctx as any)[CTX_HEADERS] as Record<string, string | string[]> | undefined;\n if (extra) for (const [k, v] of Object.entries(extra)) (merged.headers as any)[k] = v;\n\n return merged;\n\n\n };\n}\n"],"mappings":";AAGA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASA,MAAMA,CAACC,WAA0B,EAAEC,OAAiB,EAAE;EACpE,OAAO,OAAOC,GAAgB,EAAEC,GAAsB,KAAgC;IAAA,IAAAC,YAAA;IAClF,MAAMC,KAAoB,GAAG,CAAC,GAAGL,WAAW,EAAE,OAAOM,CAAC,EAAEC,CAAC,KAAKN,OAAO,CAACK,CAAC,EAAEC,CAAC,CAAC,CAAC;IAE5E,IAAIC,KAAK,GAAG,CAAC,CAAC;IACd,MAAMC,QAAQ,GAAG,MAAOC,CAAS,IAAgC;MAC7D,IAAIA,CAAC,IAAIF,KAAK,EAAE,MAAM,IAAIG,KAAK,CAAC,8BAA8B,CAAC;MAC/DH,KAAK,GAAGE,CAAC;MAET,MAAME,EAAE,GAAGP,KAAK,CAACK,CAAC,CAAC;MACnB,IAAI,CAACE,EAAE,EAAE,MAAM,IAAID,KAAK,CAAC,gCAAgC,CAAC;;MAE1D;MACA,MAAME,IAAI,GAAGA,CAAA,KAAMJ,QAAQ,CAACC,CAAC,GAAG,CAAC,CAAC;MAClC,MAAMI,MAAM,GAAG,MAAMF,EAAE,CAACV,GAAG,EAAEC,GAAG,EAAEU,IAAI,CAAC;MAEvC,IAAIC,MAAM,KAAKC,SAAS,EAAE;QACtB,MAAM,IAAIJ,KAAK,CAAC,4DAA4D,CAAC;MACjF;MACA,OAAOG,MAAM;IACjB,CAAC;IAED,MAAME,GAAG,GAAG,MAAMP,QAAQ,CAAC,CAAC,CAAC;;IAE7B;IACA,MAAMQ,WAAW,GAAGC,MAAM,CAACC,GAAG,CAAC,gBAAgB,CAAC;IAChD,MAAMC,WAAW,GAAGF,MAAM,CAACC,GAAG,CAAC,gBAAgB,CAAC,CAAC,CAAO;IACxD,MAAME,eAAe,GAAGH,MAAM,CAACC,GAAG,CAAC,oBAAoB,CAAC,CAAC,CAAC;;IAE1D,MAAMG,MAAwB,GAAAC,QAAA,KAAQP,GAAG;MAAEQ,OAAO,EAAAD,QAAA,MAAAnB,YAAA,GAAQY,GAAG,CAACQ,OAAO,YAAApB,YAAA,GAAI,CAAC,CAAC;IAAG,EAAE;;IAEhF;IACA;IACA,MAAMqB,UAAU,GAAItB,GAAG,CAASkB,eAAe,CAA6B;IAC5E,IAAII,UAAU,YAAVA,UAAU,CAAEC,MAAM,EAAE;MAAA,IAAAC,YAAA;MACpBL,MAAM,CAACM,OAAO,GAAG,CAAC,KAAAD,YAAA,GAAIX,GAAG,CAACY,OAAO,YAAAD,YAAA,GAAI,EAAE,CAAC,EAAE,GAAGF,UAAU,CAAC;IAC5D;;IAEA;IACA,MAAMG,OAAO,GAAIzB,GAAG,CAASiB,WAAW,CAAyB;IACjE,IAAIQ,OAAO,YAAPA,OAAO,CAAEF,MAAM,EAAE;MAAA,IAAAG,YAAA;MACjB,MAAMC,CAAC,GAAGR,MAAM,CAACE,OAAc;MAC/B,MAAMO,QAAQ,IAAAF,YAAA,GAAGC,CAAC,CAAC,YAAY,CAAC,YAAAD,YAAA,GAAIC,CAAC,CAAC,YAAY,CAAC;MACnDA,CAAC,CAAC,YAAY,CAAC,GAAGC,QAAQ,GACnBC,KAAK,CAACC,OAAO,CAACF,QAAQ,CAAC,GAAGA,QAAQ,CAACG,MAAM,CAACN,OAAO,CAAC,GAAG,CAACG,QAAQ,EAAE,GAAGH,OAAO,CAAC,GAC5EA,OAAO;IACjB;;IAEA;IACA,MAAMO,KAAK,GAAIhC,GAAG,CAASc,WAAW,CAAkD;IACxF,IAAIkB,KAAK,EAAE,KAAK,MAAM,CAACC,CAAC,EAAEC,CAAC,CAAC,IAAIC,MAAM,CAACC,OAAO,CAACJ,KAAK,CAAC,EAAGb,MAAM,CAACE,OAAO,CAASY,CAAC,CAAC,GAAGC,CAAC;IAErF,OAAOf,MAAM;EAGjB,CAAC;AACH","ignoreList":[]}
@@ -0,0 +1,2 @@
1
+ import { IAppId, IDomainMappings } from "../types/app";
2
+ export declare const APP_MAP: Record<IAppId, IDomainMappings>;
@@ -0,0 +1,38 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.APP_MAP = void 0;
4
+ exports.APP_MAP = {
5
+ '3238hxa2': {
6
+ appId: "3238hxa2",
7
+ name: "superadmin",
8
+ clientId: "cfy-superadmin-web",
9
+ domains: {
10
+ local: ["localhost:5173", "127.0.0.1:5173"],
11
+ dev: ["accounts.dev.culturefy.app"],
12
+ staging: ["accounts.staging.culturefy.app"],
13
+ prod: ["accounts.culturefy.app"]
14
+ },
15
+ auth: {
16
+ realm: "superadmin",
17
+ clientId: "cfy-superadmin-web",
18
+ },
19
+ exclude: {
20
+ prod: [] // e.g. add "app.culturefy.app" to prevent misrouting
21
+ },
22
+ cookie: {
23
+ prefix: "__Secure-auth",
24
+ domain: {
25
+ local: null, // host-bound in local
26
+ dev: ".culturefy.dev", // adjust to your dev root
27
+ staging: ".culturefy.staging", // adjust to your staging root
28
+ prod: ".culturefy.app"
29
+ },
30
+ path: "/",
31
+ sameSite: "None",
32
+ secure: true,
33
+ httpOnly: true,
34
+ maxAgeSec: { sid: 15 * 60, rt: 30 * 24 * 60 * 60 } // 15m / 30d
35
+ }
36
+ },
37
+ };
38
+ //# sourceMappingURL=app.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"app.js","sourceRoot":"","sources":["../../../src/constants/app.ts"],"names":[],"mappings":";;;AAEa,QAAA,OAAO,GAAoC;IACtD,UAAU,EAAE;QACR,KAAK,EAAE,UAAU;QACjB,IAAI,EAAE,YAAY;QAClB,QAAQ,EAAE,oBAAoB;QAC9B,OAAO,EAAE;YACL,KAAK,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,CAAC;YAC3C,GAAG,EAAE,CAAC,4BAA4B,CAAC;YACnC,OAAO,EAAE,CAAC,gCAAgC,CAAC;YAC3C,IAAI,EAAE,CAAC,wBAAwB,CAAC;SACnC;QAED,IAAI,EAAE;YACF,KAAK,EAAE,YAAY;YACnB,QAAQ,EAAE,oBAAoB;SACjC;QAED,OAAO,EAAE;YACL,IAAI,EAAE,EAAE,CAAC,qDAAqD;SACjE;QACD,MAAM,EAAE;YACJ,MAAM,EAAE,eAAe;YACvB,MAAM,EAAE;gBACJ,KAAK,EAAE,IAAI,EAAE,sBAAsB;gBACnC,GAAG,EAAE,gBAAgB,EAAE,0BAA0B;gBACjD,OAAO,EAAE,oBAAoB,EAAE,8BAA8B;gBAC7D,IAAI,EAAE,gBAAgB;aACzB;YACD,IAAI,EAAE,GAAG;YACT,QAAQ,EAAE,MAAM;YAChB,MAAM,EAAE,IAAI;YACZ,QAAQ,EAAE,IAAI;YACd,SAAS,EAAE,EAAE,GAAG,EAAE,EAAE,GAAG,EAAE,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,CAAC,YAAY;SAClE;KAEJ;CAEF,CAAC"}
@@ -0,0 +1 @@
1
+ export * from './app';
@@ -0,0 +1,5 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ const tslib_1 = require("tslib");
4
+ tslib_1.__exportStar(require("./app"), exports);
5
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/constants/index.ts"],"names":[],"mappings":";;;AAAA,gDAAsB"}
@@ -2,3 +2,4 @@ export * from './types';
2
2
  export * from './enums';
3
3
  export * from './utils';
4
4
  export * from './middlewares';
5
+ export * from './constants';
@@ -5,4 +5,5 @@ tslib_1.__exportStar(require("./types"), exports);
5
5
  tslib_1.__exportStar(require("./enums"), exports);
6
6
  tslib_1.__exportStar(require("./utils"), exports);
7
7
  tslib_1.__exportStar(require("./middlewares"), exports);
8
+ tslib_1.__exportStar(require("./constants"), exports);
8
9
  //# sourceMappingURL=index.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";;;AAAA,kDAAwB;AACxB,kDAAwB;AACxB,kDAAwB;AACxB,wDAA8B"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";;;AAAA,kDAAwB;AACxB,kDAAwB;AACxB,kDAAwB;AACxB,wDAA8B;AAC9B,sDAA4B"}
File without changes
@@ -0,0 +1,2 @@
1
+ "use strict";
2
+ //# sourceMappingURL=sample%20middleware.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"sample middleware.js","sourceRoot":"","sources":["../../../src/middlewares/sample middleware.ts"],"names":[],"mappings":""}
@@ -0,0 +1,2 @@
1
+ import { IMiddleware } from "../types/middleware";
2
+ export declare const verifyMw: IMiddleware;
@@ -0,0 +1,167 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.verifyMw = void 0;
4
+ const tslib_1 = require("tslib");
5
+ const utils_1 = require("../utils");
6
+ const constants_1 = require("../constants");
7
+ const jwt_decode_1 = require("jwt-decode");
8
+ const cookies_1 = require("../utils/cookies");
9
+ const apiURL = process.env.REFRESH_SESSION_URL || '';
10
+ const parseCookieHeader = (header) => {
11
+ const out = {};
12
+ if (!header)
13
+ return out;
14
+ for (const part of header.split(";")) {
15
+ const [k, ...rest] = part.trim().split("=");
16
+ if (!k)
17
+ continue;
18
+ out[k] = decodeURIComponent(rest.join("=") || "");
19
+ }
20
+ return out;
21
+ };
22
+ const verifyMw = (req, ctx, next) => tslib_1.__awaiter(void 0, void 0, void 0, function* () {
23
+ var _a, _b, _c, _d, _e, _f, _g, _h, _j, _k, _l, _m, _o, _p;
24
+ var _q;
25
+ const appId = req.headers.get("app-id");
26
+ if (!appId || !((_a = constants_1.APP_MAP === null || constants_1.APP_MAP === void 0 ? void 0 : constants_1.APP_MAP[appId]) === null || _a === void 0 ? void 0 : _a.clientId)) {
27
+ return (0, utils_1.sendResponse)(400, { status: "bad_request", reason: "invalid_app" });
28
+ }
29
+ const expectedClientId = constants_1.APP_MAP[appId].clientId;
30
+ // cookies
31
+ const cookies = parseCookieHeader(req.headers.get("cookie"));
32
+ const at = cookies[`__Secure-session-v1.${appId}.at`];
33
+ const rt = cookies[`__Secure-session-v1.${appId}.rt`];
34
+ if (!at && !rt) {
35
+ return (0, utils_1.sendResponse)(401, { status: "unauthenticated", reason: "no_tokens" });
36
+ }
37
+ // decode/verify (lightweight; replace with your verifyJsonWebToken if you have it)
38
+ let p;
39
+ try {
40
+ p = (0, jwt_decode_1.jwtDecode)(at);
41
+ }
42
+ catch (_r) {
43
+ return (0, utils_1.sendResponse)(401, { status: "unauthenticated", reason: "invalid_token" });
44
+ }
45
+ if (!(p === null || p === void 0 ? void 0 : p.sid)) {
46
+ return (0, utils_1.sendResponse)(401, { status: "unauthenticated", reason: "user_not_found" });
47
+ }
48
+ const now = Math.floor(Date.now() / 1000);
49
+ // if (typeof p.exp === "number" && p.exp <= now) {
50
+ if (typeof p.exp === "number" && p.exp >= now) {
51
+ // Delegate to refresh helper; it will handle setting cookies/state or returning an error
52
+ return yield getNewRefreshToken(req, ctx, appId, expectedClientId, rt, p, next);
53
+ }
54
+ // audience checks
55
+ const audOk = (Array.isArray(p.aud) && p.aud.includes(expectedClientId)) ||
56
+ (typeof p.aud === "string" && (p.aud === expectedClientId || p.aud === "account")) ||
57
+ p.azp === expectedClientId;
58
+ if (!audOk) {
59
+ return (0, utils_1.sendResponse)(403, { status: "forbidden", reason: "audience_mismatch" });
60
+ }
61
+ (0, cookies_1.setCookieKV)(ctx, 'ew', 'rre');
62
+ // pass data downstream
63
+ (_b = (_q = ctx).state) !== null && _b !== void 0 ? _b : (_q.state = {});
64
+ const tenantId = (_c = p.cfy_tid) !== null && _c !== void 0 ? _c : (p.iss ? new URL(p.iss).pathname.split("/").pop() : null);
65
+ ctx.state.auth = {
66
+ appId,
67
+ userId: (_d = p.sub) !== null && _d !== void 0 ? _d : null,
68
+ businessId: (_f = (_e = p.cfy_bid) !== null && _e !== void 0 ? _e : tenantId) !== null && _f !== void 0 ? _f : null,
69
+ tenantId,
70
+ email: (_h = (_g = p.email) !== null && _g !== void 0 ? _g : p.preferred_username) !== null && _h !== void 0 ? _h : null,
71
+ name: (_j = p.name) !== null && _j !== void 0 ? _j : undefined,
72
+ roles: (_p = (_m = (_l = (_k = p.resource_access) === null || _k === void 0 ? void 0 : _k[expectedClientId]) === null || _l === void 0 ? void 0 : _l.roles) !== null && _m !== void 0 ? _m : (_o = p.realm_access) === null || _o === void 0 ? void 0 : _o.roles) !== null && _p !== void 0 ? _p : [],
73
+ exp: p.exp,
74
+ };
75
+ return next();
76
+ });
77
+ exports.verifyMw = verifyMw;
78
+ function getNewRefreshToken(req, ctx, appId, expectedClientId, rt, p, next) {
79
+ return tslib_1.__awaiter(this, void 0, void 0, function* () {
80
+ var _a, _b, _c, _d, _e, _f, _g, _h, _j, _k, _l, _m, _o, _p, _q, _r;
81
+ var _s;
82
+ // Attempt server-side refresh using RT
83
+ if (!rt) {
84
+ return (0, utils_1.sendResponse)(401, { status: "unauthenticated", reason: "expired_no_rt" });
85
+ }
86
+ // Resolve realm for refresh
87
+ let realmId = (_a = constants_1.APP_MAP[appId].auth) === null || _a === void 0 ? void 0 : _a.realm;
88
+ if (!realmId) {
89
+ try {
90
+ const issRealm = (p === null || p === void 0 ? void 0 : p.iss) ? new URL(p.iss).pathname.split("/").pop() : undefined;
91
+ realmId = (p === null || p === void 0 ? void 0 : p.cfy_tid) || issRealm || undefined;
92
+ }
93
+ catch (_t) {
94
+ realmId = undefined;
95
+ }
96
+ }
97
+ if (!realmId) {
98
+ return (0, utils_1.sendResponse)(401, { status: "unauthenticated", reason: "cannot_resolve_realm" });
99
+ }
100
+ ctx.info("refreshing token payload ----------------------", {
101
+ realmId,
102
+ expectedClientId,
103
+ rt
104
+ });
105
+ // Call auth service to refresh
106
+ try {
107
+ const resp = yield fetch(apiURL, {
108
+ method: "POST",
109
+ headers: { "Content-Type": "application/json" },
110
+ body: JSON.stringify({
111
+ realmId,
112
+ clientId: expectedClientId,
113
+ refresh_token: rt
114
+ })
115
+ });
116
+ if (!resp.ok) {
117
+ const text = yield resp.text();
118
+ (_b = ctx.warn) === null || _b === void 0 ? void 0 : _b.call(ctx, `refresh call failed: ${resp.status} ${text}`);
119
+ return (0, utils_1.sendResponse)(401, { status: "unauthenticated", reason: "refresh_failed" });
120
+ }
121
+ const payload = yield resp.json();
122
+ const data = (payload === null || payload === void 0 ? void 0 : payload.data) || {};
123
+ const newAT = data.access_token;
124
+ const newRT = data.refresh_token;
125
+ if (!newAT || !newRT) {
126
+ return (0, utils_1.sendResponse)(401, { status: "unauthenticated", reason: "invalid_refresh_response" });
127
+ }
128
+ // Set refreshed cookies for client session
129
+ (0, cookies_1.setCookieKV)(ctx, `__Secure-session-v1.${appId}.at`, newAT);
130
+ (0, cookies_1.setCookieKV)(ctx, `__Secure-session-v1.${appId}.rt`, newRT);
131
+ // Decode new AT and proceed
132
+ let p2;
133
+ try {
134
+ p2 = (0, jwt_decode_1.jwtDecode)(newAT);
135
+ }
136
+ catch (_u) {
137
+ return (0, utils_1.sendResponse)(401, { status: "unauthenticated", reason: "invalid_new_token" });
138
+ }
139
+ const audOk2 = (Array.isArray(p2.aud) && p2.aud.includes(expectedClientId)) ||
140
+ (typeof p2.aud === "string" && (p2.aud === expectedClientId || p2.aud === "account")) ||
141
+ p2.azp === expectedClientId;
142
+ if (!audOk2) {
143
+ return (0, utils_1.sendResponse)(403, { status: "forbidden", reason: "audience_mismatch" });
144
+ }
145
+ // Update downstream auth state with refreshed token
146
+ (_c = (_s = ctx).state) !== null && _c !== void 0 ? _c : (_s.state = {});
147
+ const tenantId2 = (_d = p2.cfy_tid) !== null && _d !== void 0 ? _d : (p2.iss ? new URL(p2.iss).pathname.split("/").pop() : null);
148
+ ctx.state.auth = {
149
+ appId,
150
+ userId: (_e = p2.sub) !== null && _e !== void 0 ? _e : null,
151
+ businessId: (_g = (_f = p2.cfy_bid) !== null && _f !== void 0 ? _f : tenantId2) !== null && _g !== void 0 ? _g : null,
152
+ tenantId: tenantId2,
153
+ email: (_j = (_h = p2.email) !== null && _h !== void 0 ? _h : p2.preferred_username) !== null && _j !== void 0 ? _j : null,
154
+ name: (_k = p2.name) !== null && _k !== void 0 ? _k : undefined,
155
+ roles: (_q = (_o = (_m = (_l = p2.resource_access) === null || _l === void 0 ? void 0 : _l[expectedClientId]) === null || _m === void 0 ? void 0 : _m.roles) !== null && _o !== void 0 ? _o : (_p = p2.realm_access) === null || _p === void 0 ? void 0 : _p.roles) !== null && _q !== void 0 ? _q : [],
156
+ exp: p2.exp,
157
+ };
158
+ // Continue pipeline after refresh
159
+ return next();
160
+ }
161
+ catch (e) {
162
+ (_r = ctx.error) === null || _r === void 0 ? void 0 : _r.call(ctx, "refresh exception", e);
163
+ return (0, utils_1.sendResponse)(401, { status: "unauthenticated", reason: "refresh_exception" });
164
+ }
165
+ });
166
+ }
167
+ //# sourceMappingURL=verify-middleware.js.map